PrepAway - Latest Free Exam Questions & Answers

Category: JK0-018 (v.1)

Exam JK0-018: CompTIA Security+ E2C (updated April 10th, 2014)

Which of the following would BEST be used to identify the specific computer used by the insider?

Based on logs from file servers, remote access systems, and IDS, a malicious insider was stealing
data using a personal laptop while connected by VPN. The affected company wants access to the
laptop to determine loss, but the insider’s lawyer insists the laptop cannot be identified. Which of
the following would BEST be used to identify the specific computer used by the insider?


Page 20 of 27« First...10...1819202122...Last »